312-50v11 Dumps

312-50v11 Free Practice Test

EC-Council 312-50v11: Certified Ethical Hacker Exam (CEH v11)

QUESTION 101

An incident investigator asks to receive a copy of the event logs from all firewalls, proxy servers, and Intrusion Detection Systems (IDS) on the network of an organization that has experienced a possible breach of security. When the investigator attempts to correlate the information in all of the logs, the sequence of many of the logged events do not match up.
What is the most likely cause?

Correct Answer: A

QUESTION 102

If executives are found liable for not properly protecting their company’s assets and information systems, what type of law would apply in this situation?

Correct Answer: D

QUESTION 103

Ricardo has discovered the username for an application in his targets environment. As he has a limited amount of time, he decides to attempt to use a list of common passwords he found on the Internet. He compiles them into a list and then feeds that list as an argument into his password-cracking application, what type of attack is Ricardo performing?

Correct Answer: D
A dictionary Attack as an attack vector utilized by the attacker to break in a very system, that is password protected, by golf shot technically each word in a very dictionary as a variety of password for that system. This attack vector could be a variety of Brute Force Attack.
The lexicon will contain words from an English dictionary and conjointly some leaked list of commonly used passwords and once combined with common character substitution with numbers, will generally be terribly effective and quick.
How is it done?
Basically, it’s attempting each single word that’s already ready. it’s done victimization machine-controlled tools that strive all the possible words within the dictionary.
Some password Cracking Software:
• John the ripper
• L0phtCrack
• Aircrack-ng

QUESTION 104

From the following table, identify the wrong answer in terms of Range (ft). Standard Range (ft)
* 802.11a 150-150
* 802.11b 150-150
* 802.11g 150-150
* 802.16 (WiMax) 30 miles

Correct Answer: A

QUESTION 105

Clark, a professional hacker, attempted to perform a Btlejacking attack using an automated tool, Btlejack, and hardware tool, micro:bit. This attack allowed Clark to hijack, read, and export sensitive information shared between connected devices. To perform this attack, Clark executed various btlejack commands. Which of the following commands was used by Clark to hijack the connections?

Correct Answer: D